Cisco Blogs

Search Results

14 posts found

Security Features vs. Securing Features

…ring the design lifecycle. Microsoft’s Secure Design Lifecycle and Cisco’s Secure Design Lifecycle (CSDL) have many similar elements, but each are tailored to the development processes in each company. Both are a set of actions, tools, and processes aligned to various stages in the design lifecycle. They have the goal of ensuring that secure software designs are created, turned into secure code, and tested to ensure a secure product….

Read More >>

Tags: , ,

Securing Linux Based Products With CSDL

…is quite significant. Naturally many of the discussions revolved around the Cisco Secure Development Lifecycle (CSDL), Cisco’s approach to building secure products and solutions. As Graham Holmes mentioned in a recent blog post, CSDL takes a layered approach, with one of the key components being the security of the underlying operating system. As a standard part of the development process, Cisco’s product teams implement a comprehensive set of CS…

Read More >>

Tags: , , , , ,

Let’s Hack Some Cisco Gear at SecCon!

…d patch third-party software vulnerabilities. Additionally, we have grown Cisco’s Secure Development Lifecycle (CSDL) into a robust, repeatable and measurable process. As Graham Holmes mentioned in a recent blog post: Our development processes leverage product security baseline requirements, threat modeling in design or static analysis and fuzzing in validation, and registration of third-party software to better address vulnerabilities when they…

Read More >>

Tags: , , , , , , , ,

Cisco Wraps Up 5th Annual SecCon Conference

Having recently wrapped up the 5th Annual Cisco SecCon Conference, I’d like to take this opportunity to share with you what Cisco SecCon is and the benefits to our products and you, our customers. With that, let’s start with a brief overview! What is Cisco SecCon? SecCon is a security conference for Cisco engineers that focuses on two critical elements for a healthy corporate Security intelligence: 1) expansion of knowledge for all and 2) buildi…

Read More >>

Tags: , , , , , ,

Cisco Security and the Layered Defense Approach

…curity, and is the basis of the development approach that we use called the Cisco Secure Development Lifecycle (CSDL). Our development processes leverage product security baseline requirements, threat modeling in design or static analysis and fuzzing in validation, and registration of third-party software to better address vulnerabilities when they are disclosed. In the innermost layer of our products, security is built-in to devices in both sili…

Read More >>

Tags: , , ,